首页 > 最新文献

International Journal of Critical Infrastructure Protection最新文献

英文 中文
Blockchain-based anonymous authentication and data aggregation for advanced metering infrastructure in smart grid 基于区块链的匿名认证和数据聚合,用于智能电网中的高级计量基础设施
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-03 DOI: 10.1016/j.ijcip.2024.100702
Tingrui Pei , Zhiwen Hou , Jun Zhou , Chixin Xiao , Juan Zou

This paper proposes a blockchain-based scheme, focusing on anonymous identity authentication and data aggregation, for safer and more reliable bidirectional communication between the utility company and power consumers based on Advanced Metering Infrastructure (AMI). Firstly, to cope with the mutual identity authentication between resource-constrained Smart Meters, a lightweight anonymous authentication strategy is designed using Elliptic Curve Cryptography. Meanwhile, a reputation-based consensus protocol is developed to accomplish data aggregation in AMI by using decentralization and non-tampering features of the blockchain. During the communication, in each time slot, the proposed scheme only needs to select a trusted user randomly to undertake the mining node rather than to introduce a third-party in a centralized manner to summarize and record the user-side data into the blockchain. Such scheme can effectively prevent data tampering and also be effective to decrease the processing complexity. The AVISPA tool is adopted to formally evaluate its security. The simulation results show promising performance. The proposed scheme not only can guarantee secure communication but also effectively decrease the computational cost in AMI.

本文提出了一种基于区块链的方案,重点关注匿名身份验证和数据聚合,以实现基于高级计量基础设施(AMI)的公用事业公司与电力用户之间更安全、更可靠的双向通信。首先,为了应对资源受限的智能电表之间的相互身份验证,设计了一种使用椭圆曲线加密技术的轻量级匿名身份验证策略。同时,利用区块链的去中心化和不可篡改特性,开发了基于信誉的共识协议,以完成 AMI 中的数据聚合。在通信过程中,在每个时隙,所提出的方案只需随机选择一个可信用户来承担挖矿节点,而不需要以中心化的方式引入第三方将用户端数据汇总并记录到区块链中。这种方案可以有效防止数据被篡改,也能有效降低处理复杂度。本文采用 AVISPA 工具对其安全性进行了正式评估。仿真结果表明该方案性能良好。所提出的方案不仅能保证通信安全,还能有效降低 AMI 的计算成本。
{"title":"Blockchain-based anonymous authentication and data aggregation for advanced metering infrastructure in smart grid","authors":"Tingrui Pei ,&nbsp;Zhiwen Hou ,&nbsp;Jun Zhou ,&nbsp;Chixin Xiao ,&nbsp;Juan Zou","doi":"10.1016/j.ijcip.2024.100702","DOIUrl":"10.1016/j.ijcip.2024.100702","url":null,"abstract":"<div><p>This paper proposes a blockchain-based scheme, focusing on anonymous identity authentication and data aggregation, for safer and more reliable bidirectional communication between the utility company and power consumers based on Advanced Metering Infrastructure (AMI). Firstly, to cope with the mutual identity authentication between resource-constrained Smart Meters, a lightweight anonymous authentication strategy is designed using Elliptic Curve Cryptography. Meanwhile, a reputation-based consensus protocol is developed to accomplish data aggregation in AMI by using decentralization and non-tampering features of the blockchain. During the communication, in each time slot, the proposed scheme only needs to select a trusted user randomly to undertake the mining node rather than to introduce a third-party in a centralized manner to summarize and record the user-side data into the blockchain. Such scheme can effectively prevent data tampering and also be effective to decrease the processing complexity. The AVISPA tool is adopted to formally evaluate its security. The simulation results show promising performance. The proposed scheme not only can guarantee secure communication but also effectively decrease the computational cost in AMI.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"46 ","pages":"Article 100702"},"PeriodicalIF":4.1,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141939995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Probabilistic dynamic resilience quantification for infrastructure systems in multi-hazard environments 多灾害环境下基础设施系统的概率动态复原力量化
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-23 DOI: 10.1016/j.ijcip.2024.100698
Ahmed Badr , Zoe Li , Wael El-Dakhakhni

Resilience has been evolving as a key criterion for infrastructure systems as it ensures the system's dynamic performance pre-, during, and post-hazard disruptions. However, estimating these performances is challenging due to system and operation complexities, and the probabilistic dynamic nature of infrastructure system. Moreover, infrastructure systems are usually exposed to multi-hazard environments, with their own probabilistic behavior, leading to additional complexity in terms of estimating the system response and, subsequently, the overall system resilience. As such, this study develops a probabilistic resilience-centric system dynamics modeling approach to quantify infrastructure dynamic resilience based on a holistic representation of infrastructure systems under multi-hazard scenarios, whereby the probabilistic natures of both the hazards and system are incorporated. Unlike the traditional resilience quantification approaches that represent system resilience by a single value calculated after the system's full recovery, the developed model focuses on tracking the temporal evolution of system resilience along the entire period of system performance deterioration and recovery. A real-world hydropower dam, as an example for infrastructure systems, in British Columbia, Canada is used as a demonstration application to show model utility in developing resilience-guided assessment plans for infrastructure systems. Overall, the developed approach empowers the decision-makers with insights into critical operational periods, the required time to reach specified resilience targets, and the efficiency of risk mitigation measures in real-time.

抗灾能力已逐渐成为基础设施系统的一个关键标准,因为它能确保系统在灾害中断之前、期间和之后的动态性能。然而,由于系统和运行的复杂性,以及基础设施系统的概率动态特性,对这些性能进行估算具有挑战性。此外,基础设施系统通常会暴露在多种灾害环境中,其本身也具有概率行为,这就增加了估算系统响应的复杂性,进而增加了整体系统复原力的复杂性。因此,本研究开发了一种以抗灾能力为中心的概率系统动力学建模方法,以量化基础设施的动态抗灾能力,该方法基于基础设施系统在多灾害情景下的整体表示,其中纳入了灾害和系统的概率性质。传统的复原力量化方法以系统完全恢复后计算出的单一数值来表示系统复原力,与之不同的是,所开发的模型侧重于跟踪系统复原力在整个系统性能恶化和恢复期间的时间演变。以加拿大不列颠哥伦比亚省的一座实际水电站大坝为例,展示了模型在制定基础设施系统恢复力指导评估计划中的实用性。总之,所开发的方法使决策者能够深入了解关键运行期、达到指定恢复能力目标所需的时间以及......风险缓解措施的效率。
{"title":"Probabilistic dynamic resilience quantification for infrastructure systems in multi-hazard environments","authors":"Ahmed Badr ,&nbsp;Zoe Li ,&nbsp;Wael El-Dakhakhni","doi":"10.1016/j.ijcip.2024.100698","DOIUrl":"10.1016/j.ijcip.2024.100698","url":null,"abstract":"<div><p>Resilience has been evolving as a key criterion for infrastructure systems as it ensures the system's dynamic performance pre-, during, and post-hazard disruptions. However, estimating these performances is challenging due to system and operation complexities, and the probabilistic dynamic nature of infrastructure system. Moreover, infrastructure systems are usually exposed to multi-hazard environments, with their own probabilistic behavior, leading to additional complexity in terms of estimating the system response and, subsequently, the overall system resilience. As such, this study develops a probabilistic resilience-centric system dynamics modeling approach to quantify infrastructure dynamic resilience based on a holistic representation of infrastructure systems under multi-hazard scenarios, whereby the probabilistic natures of both the hazards and system are incorporated. Unlike the traditional resilience quantification approaches that represent system resilience by a single value calculated after the system's full recovery, the developed model focuses on tracking the temporal evolution of system resilience along the entire period of system performance deterioration and recovery. A real-world hydropower dam, as an example for infrastructure systems, in British Columbia, Canada is used as a demonstration application to show model utility in developing resilience-guided assessment plans for infrastructure systems. Overall, the developed approach empowers the decision-makers with insights into critical operational periods, the required time to reach specified resilience targets, and the efficiency of risk mitigation measures in <em>real-time</em>.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"46 ","pages":"Article 100698"},"PeriodicalIF":4.1,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1874548224000398/pdfft?md5=cf0b554879a85aad377f598558d3e1ea&pid=1-s2.0-S1874548224000398-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141867424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enterprise architecture modeling for cybersecurity analysis in critical infrastructures — A systematic literature review 用于关键基础设施网络安全分析的企业架构建模 - 系统文献综述
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-14 DOI: 10.1016/j.ijcip.2024.100700
Yuning Jiang , Manfred A. Jeusfeld , Michael Mosaad , Nay Oo

As digital landscapes become increasingly complex, safeguarding sensitive information and systems against cyber threats has become a paramount concern for organizations. This paper provides a comprehensive review of how enterprise architecture modeling is used in the context of cybersecurity assessment, particularly focusing on critical infrastructures. The use of enterprise architecture models for cybersecurity is motivated by the main purpose of enterprise architecture, namely to represent and manage business and IT assets and their interdependence. While enterprise architecture modeling originally served to assess Business/IT alignment, they are increasingly used to assess the cybersecurity of the enterprise. The research questions explored include the types of enterprise architecture models used for cybersecurity assessment, how security aspects are incorporated into these models, the theoretical frameworks and reference theories applied, the research methods used for evaluation, and the strengths and limitations of these models in supporting cybersecurity assessment. This review encompasses research papers published before 2024, focusing on high-quality research from peer-reviewed journals and reputable conferences, thereby providing a structured and comprehensive overview of the current state of research in this domain.

随着数字环境变得日益复杂,保护敏感信息和系统免受网络威胁已成为企业最关心的问题。本文全面回顾了企业架构建模在网络安全评估中的应用,尤其侧重于关键基础设施。将企业架构模型用于网络安全的动机是企业架构的主要目的,即表示和管理业务与 IT 资产及其相互依存关系。企业架构建模最初用于评估业务/IT 的一致性,但现在越来越多地用于评估企业的网络安全。探讨的研究问题包括用于网络安全评估的企业架构模型类型、如何将安全方面纳入这些模型、应用的理论框架和参考理论、用于评估的研究方法,以及这些模型在支持网络安全评估方面的优势和局限性。本综述涵盖 2024 年之前发表的研究论文,重点关注同行评审期刊和知名会议上的高质量研究,从而对该领域的研究现状提供一个结构化的全面概述。
{"title":"Enterprise architecture modeling for cybersecurity analysis in critical infrastructures — A systematic literature review","authors":"Yuning Jiang ,&nbsp;Manfred A. Jeusfeld ,&nbsp;Michael Mosaad ,&nbsp;Nay Oo","doi":"10.1016/j.ijcip.2024.100700","DOIUrl":"10.1016/j.ijcip.2024.100700","url":null,"abstract":"<div><p>As digital landscapes become increasingly complex, safeguarding sensitive information and systems against cyber threats has become a paramount concern for organizations. This paper provides a comprehensive review of how enterprise architecture modeling is used in the context of cybersecurity assessment, particularly focusing on critical infrastructures. The use of enterprise architecture models for cybersecurity is motivated by the main purpose of enterprise architecture, namely to represent and manage business and IT assets and their interdependence. While enterprise architecture modeling originally served to assess Business/IT alignment, they are increasingly used to assess the cybersecurity of the enterprise. The research questions explored include the types of enterprise architecture models used for cybersecurity assessment, how security aspects are incorporated into these models, the theoretical frameworks and reference theories applied, the research methods used for evaluation, and the strengths and limitations of these models in supporting cybersecurity assessment. This review encompasses research papers published before 2024, focusing on high-quality research from peer-reviewed journals and reputable conferences, thereby providing a structured and comprehensive overview of the current state of research in this domain.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"46 ","pages":"Article 100700"},"PeriodicalIF":4.1,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141698603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robustness evaluation method and defense strategy of electricity-heat integrated energy system 电热一体化能源系统的鲁棒性评估方法和防御策略
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-05 DOI: 10.1016/j.ijcip.2024.100699
Funian Hu, Chenhui Peng, Jun Chen

Even though electricity-heat integrated energy systems (IESs) can improve energy utilization, the faults generated by extreme events can induce more complex and wider impacts. Therefore, it is urgent to study the effective defense strategies associated with electricity-heat IES. Considering the theory of complex networks, a dynamic model was established in this paper which comprehensively considered the actual operating characteristics and cascading failure process of the electricity-heat IES. The structural and functional robustness of the electricity-heat IES after failure was evaluated by link survivability, capacity survivability and power survivability. According to the post-disaster system robustness evaluation results and system characteristics without adopting the defense strategy, the critical links of the system were identified. Also, seven defense strategies were formulated based on the cascading failure mechanism of the electricity-heat IES. The testing network coupled with an improved IEEE118-node power grid and 23-node heat supply network was used to verify the effectiveness of the proposed defense strategy and to provide a theoretical basis for the resilience enhancement strategy and defense resource allocation of the electricity-heat IES.

尽管电热综合能源系统(IES)可以提高能源利用率,但极端事件产生的故障会带来更复杂、更广泛的影响。因此,研究与电热综合能源系统相关的有效防御策略迫在眉睫。结合复杂网络理论,本文建立了一个动态模型,综合考虑了电热IES的实际运行特性和级联故障过程。通过链路存活率、容量存活率和功率存活率评估了故障后电热IES的结构和功能鲁棒性。根据灾后系统鲁棒性评估结果和未采用防御策略时的系统特征,确定了系统的关键环节。同时,根据电热互联系统的级联失效机制,制定了七种防御策略。测试网络结合改进的 IEEE118 节点电网和 23 节点供热网络,验证了所提防御策略的有效性,并为电-热 IES 的弹性增强策略和防御资源分配提供了理论依据。
{"title":"Robustness evaluation method and defense strategy of electricity-heat integrated energy system","authors":"Funian Hu,&nbsp;Chenhui Peng,&nbsp;Jun Chen","doi":"10.1016/j.ijcip.2024.100699","DOIUrl":"https://doi.org/10.1016/j.ijcip.2024.100699","url":null,"abstract":"<div><p>Even though electricity-heat integrated energy systems (IESs) can improve energy utilization, the faults generated by extreme events can induce more complex and wider impacts. Therefore, it is urgent to study the effective defense strategies associated with electricity-heat IES. Considering the theory of complex networks, a dynamic model was established in this paper which comprehensively considered the actual operating characteristics and cascading failure process of the electricity-heat IES. The structural and functional robustness of the electricity-heat IES after failure was evaluated by link survivability, capacity survivability and power survivability. According to the post-disaster system robustness evaluation results and system characteristics without adopting the defense strategy, the critical links of the system were identified. Also, seven defense strategies were formulated based on the cascading failure mechanism of the electricity-heat IES. The testing network coupled with an improved IEEE118-node power grid and 23-node heat supply network was used to verify the effectiveness of the proposed defense strategy and to provide a theoretical basis for the resilience enhancement strategy and defense resource allocation of the electricity-heat IES.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"46 ","pages":"Article 100699"},"PeriodicalIF":4.1,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141606269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power grid network security: A lightweight detection model for composite false data injection attacks using spatiotemporal features 电网网络安全:利用时空特征的复合虚假数据注入攻击轻量级检测模型
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-29 DOI: 10.1016/j.ijcip.2024.100697
Tianci Zhu , Jun Wang , Yonghai Zhu , Haoran Chen , Hang Zhang , Shanshan Yin

The stability of power systems is paramount to industrial operations. The deleterious inherent characteristics of false data injection attacks (FDIA) have drawn substantial interest due to their severe threats to power grids. Contemporary detection systems face numerous challenges as attackers employ various tactics, such as injecting complex elements into measurement data and formulating quick attack strategies against critical nodes and transmission lines in the power grid network topology. Conventional models often fail to adapt to the intricacies of practical situations because they focus predominantly on detecting individual components. To overcome the above predicaments, this paper proposes a lightweight detection model integrating deep separable convolutional layers, squeeze neural networks, and a bidirectional long short-term memory architecture named DSE-BiLSTM. The acquisition process of network topological characteristics is accomplished through variable graph attention autoencoder (VGAAE). This approach leverages the effectiveness of the graph convolution (GCN) layer to acquire each node’s topological feature and the graph attention (GAT) module to identify and extract the topological features of critical nodes. Furthermore, the topology information obtained by the both techniques is embedded in one-dimensional vector space in the same form as measurement data. By combining the output of VGAAE with meter measurements, the feature fusion of temporal and spatial modalities is realized. DSE-BiLSTM with optimal hyperparameters achieves an F1-score of 99.56% and a row accuracy (RACC) of 93.10% on the conventional dataset. The experimental results of FDIA detection with composite datasets of IEEE 14-bus and IEEE 118-bus systems show that the F1-score and RACC of DSE-BiLSTM remain above 84.51% and 83.56% under various attack strengths and noise levels. In addition, as the power grid network scales up, noise level’s effect on detection performance decreases, while attack strength’s effect on recognition capability increases. DSE-BiLSTM can effectively process the composite data of spatiotemporal multimodes and provides a feasible solution for the localization and detection of FDIA in realistic scenes.

电力系统的稳定性对工业运行至关重要。由于虚假数据注入攻击(FDIA)对电网的严重威胁,其有害的固有特性引起了人们的极大兴趣。由于攻击者采用各种策略,如在测量数据中注入复杂元素,以及针对电网网络拓扑中的关键节点和输电线路制定快速攻击策略,因此当代的检测系统面临着诸多挑战。传统模型主要侧重于检测单个组件,因此往往无法适应错综复杂的实际情况。为了克服上述困境,本文提出了一种集成了深度可分离卷积层、挤压神经网络和双向长短期记忆架构的轻量级检测模型,命名为 DSE-BiLSTM。网络拓扑特征的获取过程是通过可变图注意力自动编码器(VGAAE)完成的。这种方法利用图卷积(GCN)层的有效性来获取每个节点的拓扑特征,并利用图注意(GAT)模块来识别和提取关键节点的拓扑特征。此外,这两种技术获得的拓扑信息都以与测量数据相同的形式嵌入到一维向量空间中。通过将 VGAAE 的输出与电表测量数据相结合,实现了时间和空间模式的特征融合。采用最佳超参数的 DSE-BiLSTM 在传统数据集上的 F1 分数达到 99.56%,行准确率(RACC)达到 93.10%。利用 IEEE 14-bus 和 IEEE 118-bus 系统的复合数据集进行 FDIA 检测的实验结果表明,在各种攻击强度和噪声水平下,DSE-BiLSTM 的 F1 分数和 RACC 均保持在 84.51% 和 83.56% 以上。此外,随着电网网络规模的扩大,噪声水平对检测性能的影响减小,而攻击强度对识别能力的影响增大。DSE-BiLSTM 能有效处理时空多模的复合数据,为现实场景中 FDIA 的定位和检测提供了可行的解决方案。
{"title":"Power grid network security: A lightweight detection model for composite false data injection attacks using spatiotemporal features","authors":"Tianci Zhu ,&nbsp;Jun Wang ,&nbsp;Yonghai Zhu ,&nbsp;Haoran Chen ,&nbsp;Hang Zhang ,&nbsp;Shanshan Yin","doi":"10.1016/j.ijcip.2024.100697","DOIUrl":"https://doi.org/10.1016/j.ijcip.2024.100697","url":null,"abstract":"<div><p>The stability of power systems is paramount to industrial operations. The deleterious inherent characteristics of false data injection attacks (FDIA) have drawn substantial interest due to their severe threats to power grids. Contemporary detection systems face numerous challenges as attackers employ various tactics, such as injecting complex elements into measurement data and formulating quick attack strategies against critical nodes and transmission lines in the power grid network topology. Conventional models often fail to adapt to the intricacies of practical situations because they focus predominantly on detecting individual components. To overcome the above predicaments, this paper proposes a lightweight detection model integrating deep separable convolutional layers, squeeze neural networks, and a bidirectional long short-term memory architecture named DSE-BiLSTM. The acquisition process of network topological characteristics is accomplished through variable graph attention autoencoder (VGAAE). This approach leverages the effectiveness of the graph convolution (GCN) layer to acquire each node’s topological feature and the graph attention (GAT) module to identify and extract the topological features of critical nodes. Furthermore, the topology information obtained by the both techniques is embedded in one-dimensional vector space in the same form as measurement data. By combining the output of VGAAE with meter measurements, the feature fusion of temporal and spatial modalities is realized. DSE-BiLSTM with optimal hyperparameters achieves an F1-score of 99.56% and a row accuracy (RACC) of 93.10% on the conventional dataset. The experimental results of FDIA detection with composite datasets of IEEE 14-bus and IEEE 118-bus systems show that the F1-score and RACC of DSE-BiLSTM remain above 84.51% and 83.56% under various attack strengths and noise levels. In addition, as the power grid network scales up, noise level’s effect on detection performance decreases, while attack strength’s effect on recognition capability increases. DSE-BiLSTM can effectively process the composite data of spatiotemporal multimodes and provides a feasible solution for the localization and detection of FDIA in realistic scenes.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"46 ","pages":"Article 100697"},"PeriodicalIF":4.1,"publicationDate":"2024-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technological advancements and innovations in enhancing resilience of electrical distribution systems 提高配电系统复原力的技术进步和创新
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-28 DOI: 10.1016/j.ijcip.2024.100696
Divyanshi Dwivedi , Sagar Babu Mitikiri , K. Victor Sam Moses Babu , Pradeep Kumar Yemula , Vedantham Lakshmi Srinivas , Pratyush Chakraborty , Mayukha Pal

This comprehensive review paper explores power system resilience, emphasizing its evolution and comparison with reliability. It conducts a thorough analysis of the definition and characteristics of resilience and presents quantitative metrics to assess and quantify power system resilience. Additionally, the paper investigates the relevance of complex network theory in the context of power system resilience. An integral part of this review involves examining the incorporation of data-driven techniques to enhance power system resilience, including the role of predictive analytics. Furthermore, the paper explores recent techniques for resilience enhancement, encompassing both planning and operational methods. Technological innovations such as microgrid deployment, renewable energy integration, peer-to-peer energy trading, automated switches, and mobile energy storage systems are detailed in their role in enhancing power systems against disruptions. The paper also analyzes existing research gaps and challenges, providing future directions for improvements in power system resilience. Thus, it offers a comprehensive understanding that helps improve the ability of distribution systems to withstand and recover from extreme events and disruptions.

这篇综合性综述论文探讨了电力系统的恢复能力,强调了其演变过程以及与可靠性的比较。论文对复原力的定义和特征进行了深入分析,并提出了评估和量化电力系统复原力的定量指标。此外,论文还研究了复杂网络理论与电力系统恢复能力的相关性。本综述的一个组成部分是研究数据驱动技术在增强电力系统复原力方面的应用,包括预测分析的作用。此外,本文还探讨了增强复原力的最新技术,包括规划和操作方法。文中详细介绍了微电网部署、可再生能源整合、点对点能源交易、自动开关和移动储能系统等技术创新在增强电力系统抗干扰能力方面的作用。本文还分析了现有的研究差距和挑战,为提高电力系统的抗灾能力提供了未来方向。因此,它提供了一个全面的认识,有助于提高配电系统抵御极端事件和中断并从中恢复的能力。
{"title":"Technological advancements and innovations in enhancing resilience of electrical distribution systems","authors":"Divyanshi Dwivedi ,&nbsp;Sagar Babu Mitikiri ,&nbsp;K. Victor Sam Moses Babu ,&nbsp;Pradeep Kumar Yemula ,&nbsp;Vedantham Lakshmi Srinivas ,&nbsp;Pratyush Chakraborty ,&nbsp;Mayukha Pal","doi":"10.1016/j.ijcip.2024.100696","DOIUrl":"https://doi.org/10.1016/j.ijcip.2024.100696","url":null,"abstract":"<div><p>This comprehensive review paper explores power system resilience, emphasizing its evolution and comparison with reliability. It conducts a thorough analysis of the definition and characteristics of resilience and presents quantitative metrics to assess and quantify power system resilience. Additionally, the paper investigates the relevance of complex network theory in the context of power system resilience. An integral part of this review involves examining the incorporation of data-driven techniques to enhance power system resilience, including the role of predictive analytics. Furthermore, the paper explores recent techniques for resilience enhancement, encompassing both planning and operational methods. Technological innovations such as microgrid deployment, renewable energy integration, peer-to-peer energy trading, automated switches, and mobile energy storage systems are detailed in their role in enhancing power systems against disruptions. The paper also analyzes existing research gaps and challenges, providing future directions for improvements in power system resilience. Thus, it offers a comprehensive understanding that helps improve the ability of distribution systems to withstand and recover from extreme events and disruptions.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"46 ","pages":"Article 100696"},"PeriodicalIF":4.1,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141540410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the green grid: A data anomaly detection method for mitigating cyberattacks on smart meter measurements 保护绿色电网:缓解对智能电表测量的网络攻击的数据异常检测方法
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-14 DOI: 10.1016/j.ijcip.2024.100694
Asma Farooq , Kamal Shahid , Rasmus Løvenstein Olsen

Smart meters, being a vital component in the advanced metering infrastructure (AMI), provide an opportunity to remotely monitor and control power usage and act like a bridge between customers and utilities. The installation of millions of smart meters in the power grid is a step forward towards a green transition. However, it also constitutes a massive cybersecurity vulnerability. Cyberattacks on AMI can result in inaccurate billing, energy theft, service disruptions, privacy breaches, network vulnerabilities, and malware distribution. Thus, utility companies should implement robust cyber-security measures to mitigate such risks. In order to assess the impact of cybersecurity breaches on AMI, this paper presents a cyber-attack scenario on grid measurements obtained via smart meters and assesses the stochastic grid estimations under attack. This paper also presents an efficient method for the detection and identification of anomalous data within the power grid by leveraging the distance between measurements and the confidence ellipse centered around the estimated value. To assess the proposed method, a comparative analysis is done against the chi-square test for detection and the largest normalized distribution test for the identification of bad data. Furthermore, by using a Danish low-voltage grid as a base case, this paper introduces two test cases to evaluate the performance of the proposed method under single and multiple-node cyber-attacks on the grid state estimation. Results show a notable improvement in accuracy when using the proposed method. Additionally, based on these numerical results, protective countermeasures are presented for the grid.

智能电表是先进计量基础设施(AMI)的重要组成部分,它提供了一个远程监测和控制电力使用情况的机会,是客户与公用事业公司之间的桥梁。在电网中安装数以百万计的智能电表是向绿色转型迈出的一步。然而,这也构成了一个巨大的网络安全漏洞。对 AMI 的网络攻击可能导致不准确的账单、能源盗窃、服务中断、隐私泄露、网络漏洞和恶意软件传播。因此,公用事业公司应采取强有力的网络安全措施来降低此类风险。为了评估网络安全漏洞对 AMI 的影响,本文针对通过智能电表获取的电网测量数据提出了一个网络攻击场景,并评估了攻击下的随机电网估算。本文还提出了一种有效的方法,利用测量值之间的距离和以估计值为中心的置信椭圆来检测和识别电网中的异常数据。为了评估所提出的方法,本文对用于检测的卡方检验和用于识别不良数据的最大归一化分布检验进行了比较分析。此外,本文还以丹麦低压电网为基础案例,引入了两个测试案例,以评估所提出的方法在单节点和多节点网络攻击下对电网状态估计的性能。结果表明,使用所提方法后,准确性有了显著提高。此外,基于这些数值结果,还提出了电网保护对策。
{"title":"Securing the green grid: A data anomaly detection method for mitigating cyberattacks on smart meter measurements","authors":"Asma Farooq ,&nbsp;Kamal Shahid ,&nbsp;Rasmus Løvenstein Olsen","doi":"10.1016/j.ijcip.2024.100694","DOIUrl":"10.1016/j.ijcip.2024.100694","url":null,"abstract":"<div><p>Smart meters, being a vital component in the advanced metering infrastructure (AMI), provide an opportunity to remotely monitor and control power usage and act like a bridge between customers and utilities. The installation of millions of smart meters in the power grid is a step forward towards a green transition. However, it also constitutes a massive cybersecurity vulnerability. Cyberattacks on AMI can result in inaccurate billing, energy theft, service disruptions, privacy breaches, network vulnerabilities, and malware distribution. Thus, utility companies should implement robust cyber-security measures to mitigate such risks. In order to assess the impact of cybersecurity breaches on AMI, this paper presents a cyber-attack scenario on grid measurements obtained via smart meters and assesses the stochastic grid estimations under attack. This paper also presents an efficient method for the detection and identification of anomalous data within the power grid by leveraging the distance between measurements and the confidence ellipse centered around the estimated value. To assess the proposed method, a comparative analysis is done against the chi-square test for detection and the largest normalized distribution test for the identification of bad data. Furthermore, by using a Danish low-voltage grid as a base case, this paper introduces two test cases to evaluate the performance of the proposed method under single and multiple-node cyber-attacks on the grid state estimation. Results show a notable improvement in accuracy when using the proposed method. Additionally, based on these numerical results, protective countermeasures are presented for the grid.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"46 ","pages":"Article 100694"},"PeriodicalIF":4.1,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1874548224000350/pdfft?md5=01d3394f250cb1b8e954cf085c10ccec&pid=1-s2.0-S1874548224000350-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141390691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber risk assessment of cyber-enabled autonomous cargo vessel 网络自主货船的网络风险评估
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-14 DOI: 10.1016/j.ijcip.2024.100695
Awais Yousaf , Ahmed Amro , Philip Teow Huat Kwa , Meixuan Li , Jianying Zhou

The increasing interest in autonomous ships within the maritime industry is driven by the pursuit of revenue optimization, operational efficiency, safety improvement and going greener. However, the industry’s increasing reliance on emerging technologies for the development of autonomous ships extends the attack surface, leaving the underlying ship systems vulnerable to potential exploitation by malicious actors. In response to these emerging challenges, this research extends an existing cyber risk assessment approach called FMECA-ATT&CK based on failure modes, effects and criticality analysis (FMECA), and the MITRE ATT&CK framework. As a part of our work, we have expanded the FMECA-ATT&CK approach to assessing cyber risks related to systems with artificial intelligence components in cyber-enabled autonomous ships (e.g. autonomous engine monitoring and control). This new capability was developed using the information and semantics encoded in the MITRE ATLAS framework. FMECA-ATT&CK has been adopted due to its comprehensive and adaptable nature and its promising venue for supporting continuous cyber risk assessment. It helps evaluate the cyber risks associated with the complex and state-of-the-art operational technologies on board autonomous ships. The cyber risk assessment approach assists cybersecurity experts in aligning mitigation strategies for the cyber defence of autonomous ships. It also contributes towards advancing overall cybersecurity in the maritime industry and ensures the safe and secure sailing of autonomous ships. Our key findings after applying the proposed approach against a model of an autonomous cargo ship is the identification of the Navigation Situation Awareness System (NSAS) of the ship as being at the highest risk followed by the Autonomous Engine Monitoring and Control (AEMC) system. Additionally, we identified 3 high, 48 medium, and 5776 low risks across 29 components.

海运业对自主船舶的兴趣与日俱增,其驱动力是追求收入优化、运营效率、安全改善和绿色环保。然而,该行业在开发自主船舶时越来越依赖新兴技术,这扩大了攻击面,使底层船舶系统容易受到恶意行为者的潜在利用。为了应对这些新出现的挑战,本研究在故障模式、影响和关键性分析(FMECA)和 MITRE ATT&CK 框架的基础上,扩展了一种名为 FMECA-ATT&CK 的现有网络风险评估方法。作为我们工作的一部分,我们扩展了 FMECA-ATT&CK 方法,以评估与具有人工智能组件的网络自主船舶系统(如自主发动机监测和控制)相关的网络风险。这项新功能是利用 MITRE ATLAS 框架中编码的信息和语义开发的。FMECA-ATT&CK 因其全面性和适应性,以及支持持续网络风险评估的广阔前景而被采用。它有助于评估与自主船舶上复杂而先进的操作技术相关的网络风险。网络风险评估方法有助于网络安全专家调整自主式船舶网络防御的缓解战略。它还有助于推进海运业的整体网络安全,确保自主航行船舶的安全航行。在对自主货船模型应用所提出的方法后,我们的主要发现是船舶的导航态势感知系统(NSAS)风险最高,其次是自主发动机监测和控制系统(AEMC)。此外,我们还在 29 个组件中识别出 3 个高风险、48 个中风险和 5776 个低风险。
{"title":"Cyber risk assessment of cyber-enabled autonomous cargo vessel","authors":"Awais Yousaf ,&nbsp;Ahmed Amro ,&nbsp;Philip Teow Huat Kwa ,&nbsp;Meixuan Li ,&nbsp;Jianying Zhou","doi":"10.1016/j.ijcip.2024.100695","DOIUrl":"10.1016/j.ijcip.2024.100695","url":null,"abstract":"<div><p>The increasing interest in autonomous ships within the maritime industry is driven by the pursuit of revenue optimization, operational efficiency, safety improvement and going greener. However, the industry’s increasing reliance on emerging technologies for the development of autonomous ships extends the attack surface, leaving the underlying ship systems vulnerable to potential exploitation by malicious actors. In response to these emerging challenges, this research extends an existing cyber risk assessment approach called FMECA-ATT&amp;CK based on failure modes, effects and criticality analysis (FMECA), and the MITRE ATT&amp;CK framework. As a part of our work, we have expanded the FMECA-ATT&amp;CK approach to assessing cyber risks related to systems with artificial intelligence components in cyber-enabled autonomous ships (e.g. autonomous engine monitoring and control). This new capability was developed using the information and semantics encoded in the MITRE ATLAS framework. FMECA-ATT&amp;CK has been adopted due to its comprehensive and adaptable nature and its promising venue for supporting continuous cyber risk assessment. It helps evaluate the cyber risks associated with the complex and state-of-the-art operational technologies on board autonomous ships. The cyber risk assessment approach assists cybersecurity experts in aligning mitigation strategies for the cyber defence of autonomous ships. It also contributes towards advancing overall cybersecurity in the maritime industry and ensures the safe and secure sailing of autonomous ships. Our key findings after applying the proposed approach against a model of an autonomous cargo ship is the identification of the Navigation Situation Awareness System (NSAS) of the ship as being at the highest risk followed by the Autonomous Engine Monitoring and Control (AEMC) system. Additionally, we identified 3 high, 48 medium, and 5776 low risks across 29 components.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"46 ","pages":"Article 100695"},"PeriodicalIF":4.1,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141395307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demonstration of denial of charging attack on electric vehicle charging infrastructure and its consequences 演示对电动汽车充电基础设施的拒绝充电攻击及其后果
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-06 DOI: 10.1016/j.ijcip.2024.100693
Kirti Gupta , Bijaya Ketan Panigrahi , Anupam Joshi , Kolin Paul

The recent upsurge in electric vehicle (EV) adoption has led to greener mobility but has also broadened the attack surface due to the increased interconnection between the entities like EV, EV charger, grid etc. We show in this paper that among these entities, the EV charger provides a possible attack surface through the available communication network. Adversaries at a minimum can disrupt the vehicular charging process known as denial of charging (DoC) attack. This attack is demonstrated on the real hardware setup of an EV charging, where we have considered the Bharat EV DC charging standard (BEVC-DC001) adopted by India which uses the controller area network (CAN) bus to communicate between EV charger and EV. The DoC attack can have significant consequences both on the electrical grid as well as individuals. The EV chargers (with connected EV) collectively serve as a large load demand, whose sudden inaccessibility would disrupt the supply–demand balance, triggering over frequency relays to either cause local or national blackout. Such a scenario is presented in this work on a microgrid (MG), in a real-time OPAL-RT environment. Not only can this attack lead to major transportation related problems but would also disrupt medical and emergency services.

最近,电动汽车(EV)的采用率急剧上升,带来了更环保的移动性,但由于电动汽车、电动汽车充电器、电网等实体之间的相互联系增加,也扩大了攻击面。我们在本文中指出,在这些实体中,电动汽车充电器通过可用的通信网络提供了一个可能的攻击面。对手至少可以破坏车辆充电过程,即所谓的拒绝充电(DoC)攻击。我们在电动汽车充电的真实硬件设置上演示了这种攻击,我们考虑了印度采用的巴拉特电动汽车直流充电标准(BEVC-DC001),该标准使用控制器区域网络(CAN)总线在电动汽车充电器和电动汽车之间进行通信。DoC 攻击会对电网和个人造成严重后果。电动汽车充电器(与已连接的电动汽车)共同构成一个巨大的负载需求,其突然不可用将破坏供需平衡,触发超频继电器,导致本地或全国停电。本研究在 OPAL-RT 实时环境下的微电网(MG)中介绍了这种情况。这种攻击不仅会导致重大的交通问题,还会破坏医疗和急救服务。
{"title":"Demonstration of denial of charging attack on electric vehicle charging infrastructure and its consequences","authors":"Kirti Gupta ,&nbsp;Bijaya Ketan Panigrahi ,&nbsp;Anupam Joshi ,&nbsp;Kolin Paul","doi":"10.1016/j.ijcip.2024.100693","DOIUrl":"10.1016/j.ijcip.2024.100693","url":null,"abstract":"<div><p>The recent upsurge in electric vehicle (EV) adoption has led to greener mobility but has also broadened the attack surface due to the increased interconnection between the entities like EV, EV charger, grid etc. We show in this paper that among these entities, the EV charger provides a possible attack surface through the available communication network. Adversaries at a minimum can disrupt the vehicular charging process known as denial of charging (DoC) attack. This attack is demonstrated on the real hardware setup of an EV charging, where we have considered the Bharat EV DC charging standard (BEVC-DC001) adopted by India which uses the controller area network (CAN) bus to communicate between EV charger and EV. The DoC attack can have significant consequences both on the electrical grid as well as individuals. The EV chargers (with connected EV) collectively serve as a large load demand, whose sudden inaccessibility would disrupt the supply–demand balance, triggering over frequency relays to either cause local or national blackout. Such a scenario is presented in this work on a microgrid (MG), in a real-time OPAL-RT environment. Not only can this attack lead to major transportation related problems but would also disrupt medical and emergency services.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"46 ","pages":"Article 100693"},"PeriodicalIF":3.6,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141415503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancing coordination in critical maritime infrastructure protection: Lessons from maritime piracy and cybersecurity 促进关键海事基础设施保护的协调:海盗和网络安全的经验教训
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-31 DOI: 10.1016/j.ijcip.2024.100683
Tobias Liebetrau , Christian Bueger

Critical maritime infrastructure protection has become a priority in ocean governance, particularly in Europe. Increased geopolitical tensions, regional conflicts, and the Nord Stream pipeline attacks in the Baltic Sea of September 2022 have been the main catalysts for this development. Calls for enhancing critical maritime infrastructure protection have multiplied, yet, what this implies in practice is less clear. This is partially a question of engineering and risk analysis. It also concerns how the multitude of actors involved can act concertedly. Dialogue, information sharing, and coordination are required, but there is a lack of discussion about which institutional set ups would lend themselves. In this article, we argue that the maritime counter-piracy operations off Somalia, as well as maritime cybersecurity governance hold valuable lessons to provide new answers for the institutional question in the critical maritime infrastructure protection agenda. We start by clarifying what is at stake in the CMIP agenda and why it is a major contemporary governance challenge. We then examine and assess the instruments found in maritime counter-piracy and maritime cybersecurity governance, including why and how they provide effective solutions for enhancing critical maritime infrastructure protection. Finally, we assess the ongoing institution building for CMIP in Europe. While we focus on the European experience, our discussion on designing institutions carries forward lessons for CMIP in other regions, too.

关键海洋基础设施保护已成为海洋治理的优先事项,尤其是在欧洲。地缘政治紧张局势的加剧、地区冲突以及 2022 年 9 月在波罗的海发生的北溪管道袭击事件是这一事态发展的主要催化剂。加强关键海洋基础设施保护的呼声成倍增长,然而,这在实践中意味着什么却不太清楚。这部分是一个工程和风险分析问题。它还涉及到众多相关行动者如何采取一致行动的问题。对话、信息共享和协调都是必需的,但目前还缺乏关于哪种机构设置更适合的讨论。在本文中,我们认为索马里沿海的海上反海盗行动以及海上网络安全治理提供了宝贵的经验,为关键海上基础设施保护议程中的机构问题提供了新的答案。我们首先阐明了关键海洋基础设施保护议程的利害关系,以及为什么它是当代治理的一大挑战。然后,我们研究并评估海上反海盗和海上网络安全治理中的工具,包括这些工具为何以及如何为加强重要海上基础设施保护提供有效的解决方案。最后,我们对欧洲正在进行的 CMIP 体制建设进行评估。虽然我们的重点是欧洲的经验,但我们关于机构设计的讨论也为其他地区的 CMIP 提供了借鉴。
{"title":"Advancing coordination in critical maritime infrastructure protection: Lessons from maritime piracy and cybersecurity","authors":"Tobias Liebetrau ,&nbsp;Christian Bueger","doi":"10.1016/j.ijcip.2024.100683","DOIUrl":"https://doi.org/10.1016/j.ijcip.2024.100683","url":null,"abstract":"<div><p>Critical maritime infrastructure protection has become a priority in ocean governance, particularly in Europe. Increased geopolitical tensions, regional conflicts, and the Nord Stream pipeline attacks in the Baltic Sea of September 2022 have been the main catalysts for this development. Calls for enhancing critical maritime infrastructure protection have multiplied, yet, what this implies in practice is less clear. This is partially a question of engineering and risk analysis. It also concerns how the multitude of actors involved can act concertedly. Dialogue, information sharing, and coordination are required, but there is a lack of discussion about which institutional set ups would lend themselves. In this article, we argue that the maritime counter-piracy operations off Somalia, as well as maritime cybersecurity governance hold valuable lessons to provide new answers for the institutional question in the critical maritime infrastructure protection agenda. We start by clarifying what is at stake in the CMIP agenda and why it is a major contemporary governance challenge. We then examine and assess the instruments found in maritime counter-piracy and maritime cybersecurity governance, including why and how they provide effective solutions for enhancing critical maritime infrastructure protection. Finally, we assess the ongoing institution building for CMIP in Europe. While we focus on the European experience, our discussion on designing institutions carries forward lessons for CMIP in other regions, too.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"46 ","pages":"Article 100683"},"PeriodicalIF":3.6,"publicationDate":"2024-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1874548224000246/pdfft?md5=e5572e124732d1fcb1c40f392934a1e7&pid=1-s2.0-S1874548224000246-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141423305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Critical Infrastructure Protection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1